Preview

Ing Life Case Study

Good Essays
Open Document
Open Document
449 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ing Life Case Study
ING Life Case Study

1. What are the probable difficulties and risk associated with using public infrastructure, such as the internet, as part of a private business solution?
Many credit reporting systems that use internet as a mean to transfer credit data is insecure. Security holes can exist in several main parts of the credit reporting system such as data transfer, database, interface and network.
When a user order and receive information, data are transferred through the internet where hackers can listen in and intercept the data if it’s not properly encrypted. Logins, passwords and subscriber codes could also be intercepted by hackers during the transmission of data through the internet.
If the database is not configured correctly, unauthorized employees or customers can hack into the system and access private customer list, subscriber codes, etc. Sharing a single database for all their customers means that a competitor could potentially look at their information.
An insecure interface opens up the system for potential fraud.
Improper network configuration can leave parts of the system vulnerable. Once a component of the system is compromised, hackers can use the newly gained access to their advantage in obtaining access to other parts of the system. A security breach in the system can take it all down.

2. Discuss the precautions taken by ING to ensure security. Were the measures adequate?
They built an extranet and offered a Web-to-host service that would allow partners to access mainframe data directly via the internet. The client software is automatically installed as a browser applet; using a browser as an interface. They have two NT servers, a new SNA gateway and a Cisco Pix firewall connected to the internet via a leased T-1 line. The Pix firewall would prevent unauthorized access to the data. Also, the Web-to-host software used a SSL connection. They had security consultants probe the system for vulnerabilities. Yes.

3. Comment on

You May Also Find These Documents Helpful

  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    The private-public network edge is considered particularly vulnerable to intrusions, because the Internet is a publicly accessible network and falls under the management purview of multiple network operators. For these reasons, the Internet is considered an untrusted network. So are wireless LANs, which-without the proper security measures in place-can be hijacked from outside the corporation when radio signals penetrate interior walls and spill outdoors.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    1. Unauthorized network probing and port scanning. IP router, firewall and network appliance operation system vulnerability.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    P1 Unit 3 Business

    • 1539 Words
    • 7 Pages

    In this part of assignment, I will be explaining the issues a business would need to consider to go online.…

    • 1539 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 1 BIS221

    • 536 Words
    • 3 Pages

    Databases allows companies to organize all their information on one place, making it easy for people to access and share information.…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cis532 Assignment

    • 3352 Words
    • 14 Pages

    “One of the first LAN technologies was ARCNET (Attached Resource Computer NETwork), it was developed by DataPoint Corporation in 1976 and first commercial installation was in December 1977 at Chase Manhattan Bank in New York”. (DIGITAL HISTORY, 1995)…

    • 3352 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Originally, Internet was designed for absolute security environment. Therefore, the protocols which are consisting of the infrastructure of Internet have no security concerns. This means Internet is easily to be vulnerable.…

    • 572 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Erp Implementation

    • 8034 Words
    • 33 Pages

    This paper appears in the publication, Journal of Cases on Information Technology, Volume 11, Issue 2 edited by Mehdi Khosrow-Pour © 2009, IGI Global…

    • 8034 Words
    • 33 Pages
    Powerful Essays
  • Good Essays

    The notion of the male can be multifaceted and diverse. The documentary The mask you live in, released in 2014, from the team that tackled female misrepresentations within media Miss Representation, explores young men and boys that are trying to negotiate their identity and masculinities while growing up within America’s narrow view of what it is to be male. The trailer points towards the notion that posturing and created masculinities leads young boys to grow up and miss out on establishing and maintaining the close relationships they crave (The Representation Project, 2013). I hope that this documentary will gain a following and start conversations in classrooms within the subject area of media literacy that allow new understandings to…

    • 232 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    The Richman Company is a successful and prosperous firm with branches in eight locations throughout the country and Canada. To support its growth, the company uses both an intranet and an extranet network. These networks are essential to the successful operation of the company because they provide the means of communicating with all employees, who use the intranet to enroll in company benefit programs. These networks also allow all of the company’s business partners, vendors and privileged customers to gain information about the company. In recent years, the company has been expanding rapidly. As one of the company’s interns, I have been asked to analyze the company’s vulnerabilities and make a plan to protect company assets and to utilize available technology most effectively. Before making the final proposal, I examined Richman’s use of the intranet and the extranet networks and found problems that require immediate attention.…

    • 1171 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    |Being online |Theft of personal data |Computer criminals can use the data to spy on or blackmail users, hijack their online accounts (including bank |…

    • 568 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays